Today I’m gonna explain Powershell arrays, which is the most important part of the scripting and coding in Powershell, also having arrays in your code could help you much and ease your coding progress.

Powershell arrays provides a structured data which is combined into an array and stores a fixed-size sequential collection of elements of the any type.

In order to assign an Array, you must create a variable to include the arrays data in it, and you can specify the type of array the variable can reference. Here is the syntax for declaring an array variable.

Windows Deployment Services is a technology for deploying Windows on multiple computers without using CD/DVD on each computer. If you have already configured WDS on server 2012 R2, configuring it on WDS on server 2016 can be a piece of cake for you.

Hello Wiki, sometimes I see some experts follow GUI pathes in order to access a service panel to configure or rearrange it. However, accessing them through RUN or start menu as a shortcut with just a simple command would make it quickly and easier to access. Here is some of them I learnt through the years and wanted to share it with Wiki.

Sconfig comes from Server Configuration from Command prompt like CMD or Windows Powershell.

In Windows Server Core Edition the only choice for configuring your Core Windows is Sconfig.exe, after installaing your server the first thing you have to di is configuring your server. Configuration steps are as follows :

I thought to clean up and re-publish my blog on AD ports requirements. Yes, they are extensive, to the dismay of the network group in your organization. But it is what it is, and it is what we need to follow to make AD work.

Microsoft Active Directory Certificate Services [AD CS] provides a platform for issuing and managing public key infrastructure [PKI] certificates. On top of securing application and HTTP traffic the certificates that AD CS provides can be used for authentication of computer, user, or device accounts on a network.

In the series of posts this month we’ve been looking at network ports relevant to security administrators. This note explores the ports used for Active Directory (AD) communications, which is a topic particularly relevant for allowing AD traffic across a firewall. For instance, you may be wondering which ports to open to allow AD replication across internal subnets, or to allow an AD member server on a screened subnet to authenticate to a domain controller on another subnet.

Introduction

Active Directory Rights Management Services (AD RMS) Data leakage is the unauthorized transmission of information – either to people within the organization or people outside the organization – who should not be able to access that information. One of the major advantages of using AD RMS over other security features such as NTFS permission is that AD RMS permission travels along with the documents.

AD RMS can protect data in transit and at rest. For example, AD RMS can protect documents that are sent as email messages by ensuring that a message cannot be opened even if it is accidentally addressed to the wrong recipient.